In Production
Security Advisories Database: Reducing IT Support Burden Through Self-Service
Designing a searchable database for partners to track and navigate product vulnerabilities confidently
My Role
UX Lead
Problem Definition
Information Architecture
Interaction Design
Visual Design
Prototyping
Stakeholder Alignment
Team
Manager - Security Engineering
Senior Director - Web Marketing Technology
Senior Manager - Web PM
Product Owner
Timeline & Status
2 Month, In progress
Overview
Following SolarWinds' 2020 security breach, users struggled to find CVE information across two fragmented sources—internal CVEs on an unsearchable page, third-party CVEs buried in support articles. The security team asked to combine them, but I identified the real problem: discoverability. I designed a searchable, filterable database with industry-standard nomenclature and severity coding—going beyond the ask to make critical security data accessible to all users. The solution impressed stakeholders enough to showcase to leadership before development began.
Context
Post-Breach Transparency
Following SolarWinds' 2020 security breach, transparency around vulnerabilities became a non-negotiable business priority. Users needed confidence that they could quickly verify CVE impact on their products—but the existing fragmented approach undermined that trust.
Trust Center Audit
Security Advisories Index Audit
3rd Party KB Articles Audit
Security Advisories Articles Audit
The Challenge
Command F is no way to search
Technically, yes—it works. But for a table spanning six columns and dozens of entries updated several times a month, it wasn’t scalable. Users needed exact phrasing to find results, and even then, multiple hits meant scanning line by line.
Out of sight, out of mind
Third-party CVEs lived as isolated KB articles—unannounced, unsearchable, and disconnected from the main index. With no centralized database or visibility, customers didn’t even know these advisories existed. Finding them meant guessing keywords or paging through unrelated search results.
Okay… but which CVEs should I care about?
Severity scores (e.g., 5.3 vs 5.6 — both “High”) offered little real-world meaning. Users couldn’t distinguish between internal CVEs that required action and external ones that posed no risk.
Index search iterations
Solution
Centralized all CVEs (internal + 3rd party) in one searchable hub
Streamlined Discovery - Added horizontal filtering and sorting to help users quickly find relevant vulnerabilities by product, severity, or date.
Visual Differentiation System - Introduce clear visual cues (color, icons, and new internal “SWSA” codes) to distinguish SolarWinds advisories from third-party ones.
Outcome & Next Steps
The project is currently on hold pending prioritization, but upon launch, I recommended tracking the page for three months to measure:
Decrease in support cases related to 3rd-party CVE inquiries
Filter and sort usage rates
Improved findability of security information across web properties
Future Opportunities:
Cross-link advisories from product and support pages
Expand hub functionality into a searchable security database by product
Lessons Learned
Even small usability gaps (like Command+F dependency) can have major operational costs.
When it comes to security, every second counts. Customer concerned with whether or not the products they use on a daily basis are affected don’t have time to wait. Each second they are affect could be money lost. And because of that, users wanted answers quickly which resulted in our support teams getting and influx of inquiries which could have been solved with a comprehensive space for all advisories notifications. This update should result a reduction of support tickets and reports on 3rd party advisories.
Transparency isn’t just about access to data—it’s about context and clarity in how that data is presented.
A disjointed experience also can affect users getting back to normal as soon as possible. This new experience house all information in one space and allows uses to self select to get their answers quickly.